26-07-2014, 09:45 AM
Data Security Using Armstrong Numbers
Data Security Using.pdf (Size: 264.28 KB / Downloads: 92)
Abstract
Data Security is the science and study of
methods of protecting data from unauthorized disclosure
and modification As per the technology upgraded, there is
need to secure data which is transmitted over the network.
Unsecured networks can be hacked into easily, and hackers
can do lots of things in short amounts of time. A hacker can
search the hard drive of the average PC user in less than a
minute. In this short time period a search can be conducted
on spread sheets or databases that contain user names and
passwords. This paper provides a technique to encrypt the
data using a key involving Armstrong numbers. Central
server system is used to provide secure intended
Authentication between users. So here two way security is
given to key as well as data.
INTRODUCTION
Now days, to make secure data transmission different
methods are used. One of the techniques is
Cryptography, in this encryption and decryption process
is used to hide simple data from unauthorized users by
converting it into unreadable form and again retrieve it in
original form. Security is one of the major concerns of all
the users irrespective of the domain in which they work.
There are various ways by which one can ensure the
security for the data which is present in different files in
the computer. Encryption-Decryption is one of those
techniques which is quite popular. But, the complexity
which is involved in this technique doesn‟t allow its users
to apply it in a simpler way. Now, if we look into the
detailed context of this technique then we may observe
that there are number of ways which allows the user to
encrypt the private files and information.
CRYPTOGRAPHY
Cryptography, to most people, is concerned with
keeping communications private. Encryption is the
transformation of data into some unreadable formIts purpose is to ensure privacy by keeping the
information hidden from anyone for whom it is not
intended. Decryption is the reverse of encryption; it is the
transformation of encrypted data back into some
intelligible form. Encryption and decryption require the
use of some secret information, usually referred to as a
key. The data to be encrypted is called as plain text. The
encrypted data obtained as a result of encryption process
is called as cipher text. Depending on the encryption
mechanism used, the same key might be used for both
encryption and decryption, while for other mechanisms,
the keys used for encryption and decryption might be
different.
Types of Cryptographic Algorithms
There are several ways of classifying cryptographic
algorithms. In general they are categorized based on the
number of keys that are employed for encryption and
decryption, and further defined by their application and
use as in [1]. The three types of algorithms are depicted
as follow
SERVER ARCHITECTURE
A Server is a computer or device on a network that
manages network resources. For example, a file server is
a computer and storage device dedicated to storing files
Any user on the network can store files on the server.
Servers are often dedicated, meaning that they perform
no other tasks besides their server tasks. On
multiprocessing operating systems however, a single
computer can execute several programs at once. A server
in this case could refer to the program that is managing
resources rather than the entire computer
ADVANTAGES
In above algorithm, Unimodular matrix is used to
reduce the loss of data during encryption and decryption
process.
This encryption technique ensures that the data
transfer can be performed with protection since it
involves two main steps. First step is to convert the
characters into another form that means in ASCII values,
Second step by adding with the digits of the Encoding
matrix to form the required encrypted data.
Tracing process becomes difficult with this technique.
This is because data is encrypted by key using Armstrong
number and again this Armstrong number is encrypted by
using receiver‟s key. So it is more secure.
In this proposed technique encryption algorithm is too
difficult to trace or hack externally. Server plays vital
role in authentication process.
References